期刊文献+

新的动态多秘密分享方案

A New Dynamic Multiple Secrets Sharing Scheme
在线阅读 下载PDF
导出
摘要 基于单向函数和有限域上离散对数问题提出一种动态多秘密分享方案.本方案构成简便,容易检测秘密分享成员的欺诈行为,能够解决秘密更新与复用的问题,且可以很方便地增加和删除系统成员.整个方案安全性高,涉及计算复杂度小,需保存信息少,因而效率高且实用。 Based on the computational difficulty of computing discrete logarithms, a dynamic multiple secrets sharing scheme is proposed. It has simple structure, can easily identify the cheaters of all shareholders and can effectively solve the renewal and reuse problems and accept a new participant or fire a participant freely. The scheme is characterized by high security, small computational complexity, and small amount of information that should be kept. The scheme is relatively efficient.
出处 《江汉大学学报(自然科学版)》 2005年第3期67-69,共3页 Journal of Jianghan University:Natural Science Edition
基金 国家自然科学基金资助项目(10271069) 陕西省自然科学基础研究计划资助项目(2004A14) 陕西师大重点科研项目资助课题.
关键词 秘密分享 子秘密 HASH函数 阈方案 secret sharing subsecret hash function threshold scheme
  • 相关文献

参考文献7

  • 1Shamir A.How to share a secret[J].Communication of the ACM, 1979,22(11):612-613.
  • 2Blackley G R.Safeguarding cryptographic keys[A]. Reston Smith. Proceedings of the national conference of AFIPS[C].New York:AFIPS Press, 1979.313-317.
  • 3Sun H M,Shieh S P. Construction of dynamic threshold schemes[J]. Electron Lett, 1994,30(24):2023-2024.
  • 4He J,Dawson E. Multistage secret sharing based on oneway function[J]. Electron Lett, 1994,30(19): 1591-1592.
  • 5何业锋,张建中.防欺诈的动态秘密分享方案[J].西安电子科技大学学报,2004,31(1):153-155. 被引量:7
  • 6Pinch R G E.Online multiple secret sharing[J]. Electron letts, 1996, 32(12):1087-1088.
  • 7谭凯军,诸鸿文.基于单向函数的动态秘密分享机制[J].通信学报,1999,20(7):81-84. 被引量:19

二级参考文献11

  • 1Brickell E F, Daveport D M. On the Classification of Idea Secret Sharing Scheme[J]. J Cryptolngy, 1991, 4(2) : 123-134.
  • 2Tompa M, Woll H. How to Share a Secret with Cheaters[J]. Journal of Cryptology, 1988, 1(2) : 133-138.
  • 3Chor B, Goldwasser S, Micali S, et al. Verifiable Secret Sharing and Achieving Simulataneity in the Presence of Faults[A]. Proceedings of the 26th Symposium on Foundations of computer Science[C]. New York: IEEE Press, 1985. 383-395.
  • 4Stadler M. Publicly Verifiable Secret Sharing[A]. Advances in Cryptology-Euroerypt'96[C]. Berfin: Spfinger-Verlag, 1996. 190-199.
  • 5Gennaro R, Micali S. Verifiable Secret Sharing as Secure Computation[A]. Advances in C, typtology-Crypto'94[C]. Berlin: Springer-Veralg, 1995. 168-182.
  • 6Fouque P A, Poupard G, Sten J. Sharing Decrption in the Context of Voting or Lotteries[A]. Proceedings of Financial Cryptography 2000[C]. Berlin: Springer-Verlag, 2000. 90-104.
  • 7Schneier B. Applied Cryptography[M]. 2nd Edition. New York: John Wiley & Sons, lnc, 1994.
  • 8Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 9Blackley G R. Safeguarding Cryptographic Keys[A]. Proceedings of the National Computer Conference of AFIPS[C]. New York: AFIPS Press, 1979. 313-317.
  • 10He J,Electron Lett,1994年,30卷,19期,1591页

共引文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部